Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. The attacker would require elevated privileges for example a valid OAM user having the system administrator role to exploit the vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-22370 Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. The attacker would require elevated privileges for example a valid OAM user having the system administrator role to exploit the vulnerability.
Fixes

Solution

Ericsson RAN Compute Basebands: Upgrade to 24.Q1 IP1, 23.Q4 C1, 23.Q3 C3, 23.Q2 C5, 23.Q1 C5 LTE only, 22.Q4 C6 LTE only


Workaround

No workaround given by the vendor.

History

Fri, 16 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Ericsson
Ericsson controller 6610
Ericsson ran Compute
CPEs cpe:2.3:h:ericsson:controller_6610:*:*:*:*:*:*:*:*
cpe:2.3:h:ericsson:ran_compute:*:*:*:*:*:*:*:*
Vendors & Products Ericsson
Ericsson controller 6610
Ericsson ran Compute
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Aug 2024 10:00:00 +0000

Type Values Removed Values Added
Description Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. The attacker would require elevated privileges for example a valid OAM user having the system administrator role to exploit the vulnerability.
Title Ericsson RAN Compute and Site Controller 6610 - Improper Input Validation Vulnerability
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ERIC

Published:

Updated: 2024-08-16T13:50:48.465Z

Reserved: 2024-02-02T21:33:13.076Z

Link: CVE-2024-25008

cve-icon Vulnrichment

Updated: 2024-08-16T13:50:33.653Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-16T10:15:04.823

Modified: 2024-08-19T13:00:23.117

Link: CVE-2024-25008

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.